| Literature DB >> 36080945 |
Fahad Mazaed Alotaibi1, Arafat Al-Dhaqm2, Yasser D Al-Otaibi3, Abdulrahman A Alsewari4.
Abstract
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be applied to several purposes, especially in smart cities. These involve traffic observation, environmental monitoring, and public safety. The need to realize effective drone forensic processes has mainly been reinforced by drone-based evidence. Drone-based evidence collection and preservation entails accumulating and collecting digital evidence from the drone of the victim for subsequent analysis and presentation. Digital evidence must, however, be collected and analyzed in a forensically sound manner using the appropriate collection and analysis methodologies and tools to preserve the integrity of the evidence. For this purpose, various collection and analysis models have been proposed for drone forensics based on the existing literature; several models are inclined towards specific scenarios and drone systems. As a result, the literature lacks a suitable and standardized drone-based collection and analysis model devoid of commonalities, which can solve future problems that may arise in the drone forensics field. Therefore, this paper has three contributions: (a) studies the machine learning existing in the literature in the context of handling drone data to discover criminal actions, (b) highlights the existing forensic models proposed for drone forensics, and (c) proposes a novel comprehensive collection and analysis forensic model (CCAFM) applicable to the drone forensics field using the design science research approach. The proposed CCAFM consists of three main processes: (1) acquisition and preservation, (2) reconstruction and analysis, and (3) post-investigation process. CCAFM contextually leverages the initially proposed models herein incorporated in this study. CCAFM allows digital forensic investigators to collect, protect, rebuild, and examine volatile and nonvolatile items from the suspected drone based on scientific forensic techniques. Therefore, it enables sharing of knowledge on drone forensic investigation among practitioners working in the forensics domain.Entities:
Keywords: UAV; design science research; drone forensics; smart cities
Mesh:
Year: 2022 PMID: 36080945 PMCID: PMC9460793 DOI: 10.3390/s22176486
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1Using UAVs for various purposes in the smart environment [1].
Figure 2A UAV architecture composition.
Figure 3Framework for the model development process.
Recognized and nominated drone forensics models.
| ID. | Models | Year | Authors | Description of the Model |
|---|---|---|---|---|
| 1. | [ | 2015 | Mhatre et al. | They offered a tool using Java-FX to visualize the real-time flight control. Their designed tool is not directly applicable to the DF field; however, it can create efficient connections between a drone and its controller to transfer data. In addition, this tool can display sensor parameters, including GPS, IMU, and altitude for pilots, which provides a great level of safety for flights |
| 2. | [ | 2016 | Horsman | This study offered an initial assessment of UAV devices, emphasizing the issues caused by this equipment to the digital forensic experts and law enforcement examinations. They provided an investigation of a Parrot Bebop drone and a study of the mobile tools used to pilot it, namely Galaxy and an iPhone 6, both using the Parrot’s offered UAVs flight routing product “FreeFlight3”. |
| 3. | [ | 2016 | Mohan | In this study, the author analyzed the drones’ vulnerabilities and applications and their relationships with issues that generally arise in the cybersecurity domain. They asserted that if a drone is hacked and abused by opponents, serious risks or consequences may arise. That study primarily focused on identifying the benefits of using drones in numerous conditions, from employing these devices as children’s toys to using them as mass destruction weapons. |
| 4. | [ | 2016 | Kovar, Dominguez, and Murph | The authors discussed all components of a drone. They all emphasized the use of the Linux operating system and its potential to gather evidence on the Linux file system. Note that to work properly, drones need to use an OS. |
| 5. | [ | 2016 | Maarse et al. | Researchers tried to evaluate DRFs with the purpose of DJI Phantom 2 commonly. They assessed the drone’s software and hardware and reviewed how they can be used to apply DRFs. Their results achieved the creation of a principle in the dedication and range of DRFs |
| 6. | [ | 2016 | Procházka | Authors attempted to integrate the visualizing data recovered from drones with a non-forensic approach. They designed an application to visualize the log parameters from flight data. However, only a small number of drones were evaluated in their study. The scope of this working on the Parrot AR Drone 2.0. |
| 7. | [ | 2017 | Prastya, Riadi, and Luthfi | The researchers comprehensively discussed how the GPS coordinates could be used as location evidence while examining the crimes committed with the help of a drone. They attempted not only to extract the system logs but also to visualize GPS coordinates on maps, where the web-based third-party platforms were used to plot the flight paths. |
| 8. | [ | 2017 | Jain, Rogers, and Matson | The authors proposed a 12-phase forensic framework to offer an innovative approach to the systematic investigation of UAVs. Wide-ranging tests were carried out on five commercial UAVs, for instance, the Parrot AR Drone 2.0, to identify the relationships amongst various components. They also executed an experiment to validate their developed framework. All the UAVs tested in the study were modified by adding and removing some parts. These modifications were done to try to check whether the framework involved all of the various elements in any basic commercial UAV and to examine whether it could be applied to a comprehensive UAV analysis. They found out that an important issue that does not allow for mitigating the attacks effectively is the deficiency of law enforcement training processes in UAVs. None of the UAVs were exposed to forensic analyses; however, an effective framework was finally constructed, which applied to the ex-amination and analysis of the stages involved. |
| 9. | [ | 2017 | Clark et al. | In this study, the authors were the first researchers that comprehensively analyzed the DJI Phantom 3 Standard. The examined UAV was flown towards two different sites. Then, the collected data were separated into three parts: controller, drone, and phone/tablet. Eventually, they explored two types of files of interest: the “.dat” files produced by the UAV and the “.txt” files produced by the DJI GO application. The files were first subjected to the decryption and decodification processes; after that, the information about the GPS locations, flight status, Wi-Fi connections, remote control, motors, etc., was extracted. When the obtained data were analyzed, and the proprietary file structures were well-understood, the researchers developed the DROP tool for the analysis of the evidentiary files. Additionally, they developed a forensically sound open-source drone open-source parser (DROP) tool. |
| 10. | [ | 2017 | Bucknell and Bassindal | The authors analyzed the effects of a quadcopter’s downwash to know whether it can affect the retaining of material evidence in crime events. |
| 11. | [ | 2017 | Llewellyn | The authors attempted to explore the flight data correlation among drones, SD cards, and mobile phones. Finding a connection between a drone and a suspect significantly facilitates criminal inspections. The application of specific software to private UAV devices could lead to the provision of many digital items such as GPS timestamps and waypoints, several connected satellites, barometer, pitch, roll, battery status, azimuth, distance, photos, and videos. |
| 12. | [ | 2017 | Barton and Azhar | The researchers in this study used Windows and Kali (a Linux distribution) as forensic workstations to conduct the needed analyses on A.R Drone and DJI Phantom 3. Different open-source tools such as Geo-Player have been used primarily to visualize the data related to the flight path. Due to the absence of a proper built environment, including a package manager, configuration tools, and a compiler within the UAV system, this option entails making a serious change to the data existing in the UAV. For that reason, it was terminated in favor of the logical level acquisition. This was carried out by mounting a forensic mass storage device onto a UAV; then, the existing files were copied entirely from the mounted “/ data” partition using the “cp” command. |
| 13. | [ | 2017 | A. L. P. S. Renduchintala, Albehadili, and Javaid | The authors tried to examine the key log boundaries of the independent UAV. They suggested comprehensive forensic software for the drone design with initial findings. |
| 14. | [ | 2018 | Bouafif et al. | In this study, the authors utilized digital forensics to the Parrot A.R Drone 2.0. They delivered a dialogue on various common statements and file structures and then tried to imagine the trip path with the aid of Google Earth. |
| 15. | [ | 2018 | Roder, Choo, and Le-Khac | The authors presented a set of rules for drone examinations in this study. They tried to discern the direction to conduct a drone forensic examination with the purpose of the DJI Phantom 3 drone as a real scenario. |
| 16. | [ | 2018 | Maune | The authors offered their own set of guidelines in this regard. To end with, they explained how their procedures could be effectively implemented when analyzing a drone forensically. They employed DJI Phantom 3 drone as their case study. A key limitation in UAV forensics is that there is not any confirmed forensically useful tool (this indeed recommends a direction for future research). For example, the subsequent logical step is the creation of different parsing tools that can analyze original data and make available readable and reliable information. In addition, UAVs are expected to attain the capacity needed for being properly integrated with radio communication services in the future. |
| 17. | [ | 2018 | Benzarti, Triki, and Korbaa | In this study, a novel architecture was introduced using the ID-based Signcryption to guarantee the authentication process and privacy preservation. In the initial step, the authors defined the key elements that the architecture relies on. After that, they investigated the interactions between these elements to explore how the process goes on. Next, they elaborated on their proposed authentication scheme. Thus, the RFID tags were applied to tracking the drones and the temporary identity to preserve privacy. In addition, they simulated the calculation of the average renewal of temporary identity by testing the drones’ different times and speeds. |
| 18. | [ | 2018 | Gülataş and Baktır | The essential major log parameters of the autonomous drone were analyzed, and it was suggested to employ comprehensive software architecture related to drone forensics with preliminary results. The researchers expected that their developed software could provide a user-friendly graphical user interface (GUI) based on which the users could extract and investigate the onboard flight information. In addition, they claimed their findings would contribute to the body of the drone forensics field by designing a new tool that greatly helps run investigations effectively on criminal deeds executed with the help of drones. |
| 19. | [ | 2018 | Dawam, Feng, and Li | The authors attempted to identify the potential cyber-physical security threats and address the current challenges attributed to UAV security before a time in the future when UAVs are the predominant vehicles used by ordinary people. Furthermore, in that study, there is a suggestion about using a certain method that can be applied effectively to examining large-scale cyber-security attack vectors of such systems concerning four classes of systems, which are highly important to UAV operations. Furthermore, the authors elaborated on the contributions of their findings and suggested the appropriate ways to defend against such attacks. |
| 20. | [ | 2018 | Esteves, Cottais, and Kasmi | In this paper, authors designed arbitrary software and then applied it to a locked target to gain access to the device’s interior sensors and logs with the help of neutralization and hardening strategies to predict the effectiveness. |
| 21. | [ | 2018 | Shi et al. | The authors discussed the overall legal processes that need to be taken into action to collect drones from the crime scene and investigate them in the laboratory. |
| 22. | [ | 2018 | Guvenc et al. | In this study, a model was introduced for collecting and documenting digital data from the flight items and the related mobile devices to aid investigators in forensically examining two common drone systems, i.e., the Mavic Air and DJI Spark. |
| 23. | [ | 2018 | Ding et al. | The authors conducted a preliminary forensic analysis on the Parrot Bebop, known as the only UAV similar to the Parrot AR Drone 2.0. |
| 24. | [ | 2019 | A. Renduchintala et al. | The researchers made a forensic analysis of a captured UAV. Security forces may capture suspected UAVs using different techniques or tools such as a shotgun; these devices may break into private properties. It is necessary to determine what software/hardware modules are used to examine a UAV. After that, the investigator needs to perform three activities: gathering accessible evidence, providing the chain of custody, and analyzing the media/artifact loaded on the UAV. The increasing incidence of unlawful utilization of UAVs reflects legal ambiguity and uncertainty in the existing aviation regulations. This problem has resulted in the shortage of evidence and fundamental standards. |
| 25. | [ | 2019 | Fitwi, Chen, and Zhou | The researchers designed an innovative scheme called distributed, agent-based secure mechanism for IoD and smart grid sensors monitoring (DASMIS). Their aim was to test a hybrid of peer-to-peer (P2P) and client-server (C/S) network architecture with reduced protocol overheads for immediate and bandwidth-efficient communication. Each node within this system is assigned with an initial status and provided with a python-based agent that can scan and detect in read-only node-IDs, node MAC address, system calls made, node IP address, all running system programs and applications, installed applications, and modifications. The agent securely authenticates the nodes, puts communications in a coded form, and approves inter-node access. This can prevent and detect different attacks, e.g., modification, masquerading, and DoS attacks. In addition, it can execute data encryption and hashing, and it reports the changes to other peer nodes and the server that is located at the C&C center. |
| 26. | [ | 2019 | Jones, Gwinnett, and Jackson | The authors attempted to facilitate the processes such as generating, analyzing, validating, and optimizing data to trace evidence recovery. To do this, they introduced and explained the approach adopted for solving this problem considering the target fiber retrieval context using self-adhesive tapes. |
| 27. | [ | 2019 | Salamh and Rogers | The authors attempted to adapt digital forensic processes to enhance drone incident response plans by implementing the drone forensic analysis process. The authors in that study provided more detailed information about the developed Drone Forensics and Incident Response Plan. They resulted in the fact that the Federal Aviation Administration (FAA) can update what unmanned aerial systems (UAS) require based on two classifications of UAS. In addition, they performed an inclusive review of the existing literature. They found out that it lacks research concentrating on incident responses and forensic analysis frameworks designed specifically for remotely piloted aerial systems. Then, they attempted to bridge this gap. |
| 28. | [ | 2019 | Esteves | The researchers introduced the concept of “electromagnetic watermarking” as a technique exploiting the IEMI impacts to embed a watermark into civilian UAVs so that forensic tracking could be done well. |
| 29. | [ | 2019 | J. L. Esteves, E. Cottais, and C. Kasmi | In this study, many aircraft accident investigators and drone forensics investigators were surveyed to find out how they employ forensic models to carry out forensic analyses on drones. The authors analyzed the data using the chi-square test of independence; it revealed no significant connection between the drone investigations of the groups of respondents and the techniques they use to perform UAS forensics. |
| 30. | [ | 2019 | Le Roy et al. | A new method was introduced to accurately and quickly determine whether a drone is lying on the ground or in the sky. These results are attained just by eavesdropping on the radio traffic and processing it using standard machine learning techniques (instead of using any active approach). The authors in that study asserted that if the network traffic is classified properly, the exact status of a drone could be accurately determined using the overall operating system of ArduCopter (for instance, several DJI and Hobbyking vehicles). Furthermore, a lower bound was created on the detection delay when using the aforementioned method. It was confirmed that their proposed solution could discriminate against a drone’s state (moving or steady) with approximately 0.93 SR in 3.71 s. |
| 31. | [ | 2019 | Sciancalepore et al. | The authors proposed using only the encrypted communication traffic between the drone and the remote controller to determine the drone’s status (flying or at rest). A drone equipped with ArduCopter firmware was used to collect the data. Without using the contents of the encrypted packet, six features were produced (inter-arrival time, packet size, mean and standard deviation computed over a certain number of samples of inter-arrival time and packet size). Three different classifiers, i.e., decision tree, random forest, and neural networks, were used to classify data (decision tree, random forest, and neural networks). The random forest classifier yielded superior results for drone detection. |
| 32. | [ | 2020 | Lakew Yihunie, Singh, and Bhatia | The researchers assessed and discussed the security vulnerabilities of Parrot Mambo FPV and Eachine E010 drones. They then suggested proper countermeasures to enhance their resilience against possible attacks. The findings showed that Parrot Mambo FPV was vulnerable to de-authentication and FTP service attacks, while Eachine E010 was susceptible to radio frequency (RF) replay and custom-made controller attacks. |
Extracted processes.
| No | Similar Processes |
|---|---|
| 1. | Collecting Drone Data |
| 2. | Drone Evidence Collection |
| 3. | Collection Drone Process |
| 4. | Drone Items Collection |
| 5. | Drone Data Extraction Process |
| 6. | Starting of Investigation |
| 7. | Drone Metadata Gathering |
| 8. | Drone Data Collection |
| 9. | Collecting Drone Files |
| 10. | Drone Item Collection |
| 11. | Collection process |
| 12. | Collection of Drone Nonvolatile Items |
| 13. | Collection of Drone Volatile Items |
| 14. | Drone Item Collection |
| 15. | Collection Suspect Drone System |
| 16. | Drone Collection and Preservation Process |
| 17. | Collection of Drone Process |
| 18. | Execution of Drone Data |
| 19. | Collection, Preservation |
| 20. | Drone Item Collection |
| 21. | Drone Items Collection |
| 22. | Reconstructing Drone Events |
| 23. | Restoring Drone Integrity |
| 24. | Drone Media Analysis |
| 25. | Timeline Creation of Drone Data |
| 26. | Drone Data Recovery |
| 27. | Search String |
| 28. | Drone Artifact Analysis |
| 29. | Financial and Business Data Analysis |
| 30. | Drone Restoration and Searchability |
| 31. | Investigation on Drone Data Collected |
| 32. | Drone Artifact Analysis |
| 33. | Rebuilding of Drone Data |
| 34. | Reconstruction of Drone Events |
| 35. | Drone Forensic Analysis |
| 36. | Analysis of Anti-forensic Drone Attacks, Analysis of Drone Attack |
| 37. | Reconstructing Drone Evidence |
| 38. | Reconstruction Process |
| 39. | Analysis Process |
| 40. | Reconstructing Drone Volatile Items |
| 41. | Recovering Drone Schema |
| 42. | Analysis of Drone Stages |
Collection and preservation processes.
| No | Similar Processes |
|---|---|
| 1. | Collecting Drone Data |
| 2. | Drone Evidence Collection |
| 3. | Drone Collection process |
| 4. | Drone Item Collection |
| 5. | Drone Data Extraction Process |
| 6. | Starting the Investigation |
| 7. | Drone Metadata Gathering |
| 8. | Drone Data Collection |
| 9. | Collecting Drone Files |
| 10. | Drone Item Collection |
| 11. | Drone Collection Process |
| 12. | Collection of Drone Nonvolatile Items |
| 13. | Collection of Drone Volatile Items |
| 14. | Drone Items Collection |
| 15. | Collection Suspect Drone System |
| 16. | Collection and Preservation |
| 17. | Drone Collection process |
| 18. | Execution of Drone Data |
| 19. | Collection, Preservation |
| 20. | Drone Items Collection |
| 21. | Drone Items Collection |
Reconstruction and analysis processes.
| No | Similar Processes |
|---|---|
| 1 | Reconstructing Drone Data |
| 2 | Restoring Drone Integrity |
| 3 | Drone Media Analysis |
| 4 | Timeline Creation of Drone Data |
| 5 | Drone Data Recovery |
| 6 | Search String |
| 7 | Drone Artifact Analysis |
| 8 | Financial and Business Data Analysis |
| 9 | Drone Restoration and Searchability |
| 10 | Investigation on Drone Data Collected |
| 11 | Drone Artifact Analysis |
| 12 | Reconstruction of Drone Data |
| 13 | Reconstruction of the Drone Events |
| 14 | Drone Forensic Analysis |
| 15 | Analysis of Anti-forensic Attacks, Analysis of Drone Attacks |
| 16 | Reconstructing Drone Evidence |
| 17 | Reconstruction Process |
| 18 | Drone Analysis Process |
| 19 | Reconstructing Drone Volatile Items |
| 20 | Recovering Drone Schema |
| 21 | Analysis of Drone Stages |
Figure 4Comprehensive collection and analysis model for the drone forensics field.
A comparative summary: the proposed CCAFM and existing drone forensic models.
| ID | Processes in the Compared Models | Processes in the Proposed Model | ||
|---|---|---|---|---|
| Collection and Preservation | Reconstruction and Analysis | Post-Investigation | ||
| 1. | Collecting Drone Data | ✓ | ✓ | × |
| 2. | Drone Evidence Collection | ✓ | ✓ | × |
| 3. | Collection Process | ✓ | ✓ | × |
| 4. | Drone Items Collection | ✓ | ✓ | × |
| 5. | Drone Data Extraction Process | ✓ | ✓ | × |
| 6. | Starting the Investigation | ✓ | ✓ | × |
| 7. | Drone Metadata Gathering | ✓ | ✓ | × |
| 8. | Drone Data Collection | ✓ | ✓ | × |
| 9. | Collecting Drone Files | ✓ | ✓ | × |
| 10. | Drone Items Collection | ✓ | ✓ | × |
| 11. | Drone Collection Process | ✓ | ✓ | × |
| 12. | Collection of Drone Nonvolatile Items | ✓ | ✓ | × |
| 13. | Collection of Drone Volatile Items | ✓ | ✓ | × |
| 14. | Drone Items Collection | ✓ | ✓ | × |
| 15. | Collection of Suspect Drone System | ✓ | ✓ | × |
| 16. | Collection and Preservation | ✓ | ✓ | × |
| 17. | Drone Collection Process | ✓ | ✓ | × |
| 18. | Execution of Drone Data | ✓ | ✓ | × |
| 19. | Collection, Preservation | ✓ | ✓ | × |
| 20. | Drone Items Collection | ✓ | ✓ | × |
| 21. | Drone Items Collection | ✓ | ✓ | × |
| 22. | Reconstructing Drone Data | ✓ | ✓ | × |
| 23. | Restoring Drone Integrity | ✓ | ✓ | × |
| 24. | Drone Media Analysis | ✓ | ✓ | × |
| 25. | Timeline Creation of Drone Data | ✓ | ✓ | × |
| 26. | Drone Data Recovery | ✓ | ✓ | × |
| 27. | Search String | ✓ | ✓ | × |
| 28. | Drone Artifact Analysis | ✓ | ✓ | × |
| 29. | Financial and Business Data Analysis | ✓ | ✓ | × |
| 30. | Drone Restoration and Searchability | ✓ | ✓ | × |
| 31. | Investigation on Drone Data Collected | ✓ | ✓ | × |
| 32. | Drone Artifact Analysis | ✓ | ✓ | × |
| 33. | Rebuilding of Drone Data | ✓ | ✓ | × |
| 34. | Reconstruction of the Drone Events | ✓ | ✓ | × |
| 35. | Drone Forensic Analysis | ✓ | ✓ | × |
| 36. | Analysis of Anti-forensic Attacks, Analysis of Drone Attack | ✓ | ✓ | × |
| 37. | Reconstructing Drone Evidence | ✓ | ✓ | × |
| 38. | Reconstruction Drone Process | ✓ | ✓ | × |
| 39. | Drone Analysis Process | ✓ | ✓ | × |
| 40. | Reconstructing Drone Volatile Items | ✓ | ✓ | × |
| 41. | Recovering Drone Schema | ✓ | ✓ | × |
| 42. | Analysis of Drone Stages | ✓ | ✓ | × |